Escolar Documentos
Profissional Documentos
Cultura Documentos
Classifications
Computer crime encompasses a broad range of
activities.[8]
Cyberterrorism
Cyberextortion
Cyberwarfare
Computer as a tool
Online harassment
The examples and perspective in this section may not
represent a worldwide view of the subject. Learn more
Drug trafficking
Darknet markets are used to buy and sell
recreational drugs online. Some drug
traffickers use encrypted messaging tools to
communicate with drug mules. The dark web
site Silk Road was a major online marketplace
for drugs before it was shut down by law
enforcement (then reopened under new
management, and then shut down by law
enforcement again). After Silk Road 2.0 went
down, Silk Road 3 Reloaded emerged. However,
it was just an older marketplace named
Diabolus Market, that used the name for more
exposure from the brand's previous
success.Cite error: A <ref> tag is missing
the closing </ref> (see the help page).
Diffusion of cybercrime
Investigation
Legislation
Penalties
Awareness
See also
Computer Fraud and Abuse Act
Computer security
Computer trespass
Convention on Cybercrime
Cyber defamation law
Cyber-
Cyberheist
Domain hijacking
(Illegal) drop catching
Economic and industrial espionage
FBI
Immigration and Customs Enforcement
(ICE)
Internet homicide
Internet suicide pact
Legal aspects of computing
List of computer criminals
Metasploit Project
National Crime Agency (NCA)
Penetration test
Police National E-Crime Unit
Protected computer
Techno-thriller
Trespass to chattels
United States Secret Service
White-collar crime
Web shell
References
1. Moore, R. (2005) "Cyber crime:
Investigating High-Technology Computer
Crime," Cleveland, Mississippi: Anderson
Publishing.
2. Warren G. Kruse, Jay G. Heiser (2002).
Computer forensics: incident response
essentials. Addison-Wesley. p. 392.
ISBN 978-0-201-70719-9.
3. * Halder, D., & Jaishankar, K. (2011) Cyber
crime and the Victimization of Women: Laws,
Rights, and Regulations. Hershey, PA, USA:
IGI Global. ISBN 978-1-60960-830-9
4. Steve Morgan (January 17, 2016). "Cyber
Crime Costs Projected To Reach $2 Trillion by
2019" . Forbes. Retrieved September 22,
2016.
5. "Cyber crime costs global economy $445
billion a year: report" . Reuters. 2014-06-09.
Retrieved 2014-06-17.
6. "#Cybercrime— what are the costs to
victims - North Denver News" . North Denver
News. 2015-01-17. Retrieved 16 May 2015.
7. Lewis, James (February 2018). "Economic
Impact of Cybercrime - No Slowing Down"
(PDF).
8. Gordon, Sarah (July 25, 2006). "On the
definition and classification of cybercrime"
(PDF). Retrieved January 14, 2018.
9. Laqueur, Walter; C., Smith; Spector, Michael
(2002). Cyberterrorism . Facts on File.
pp. 52–53. ISBN 9781438110196.
10. "Cybercriminals Need Shopping Money in
2017, Too! - SentinelOne" . sentinelone.com.
2016-12-28. Retrieved 2017-03-24.
11. Lepofsky, Ron. "Cyberextortion by Denial-
of-Service Attack" (PDF). Archived from the
original (PDF) on July 6, 2011.
12. Mohanta, Abhijit (6 December 2014).
"Latest Sony Pictures Breach : A Deadly Cyber
Extortion" . Retrieved 20 September 2015.
13. Dennis Murphy (February 2010). "War is
War? The utility of cyberspace operations in the
contemporary operational environment" (PDF).
Center for Strategic Leadership. Archived from
the original (PDF) on 20 March 2012.
14. "Cyber Crime definition" .
15. "Save browsing" . google.
16. "2011 U.S. Sentencing Guidelines Manual
§ 2G1.3(b)(3)" . 2013-10-28.
17. "United States of America v. Neil Scott
Kramer" . Retrieved 2013-10-23.
18. "South Carolina" . Retrieved 16 May 2015.
19. "1. In Connecticut, harassment by
computer is now a crime" . Nerac Inc. February
3, 2003. Archived from the original on April
10, 2008.
20. "Section 18.2-152.7:1" . Code of Virginia.
Legislative Information System of Virginia.
Retrieved 2008-11-27.
21. Susan W. Brenner, Cybercrime: Criminal
Threats from Cyberspace , ABC-CLIO, 2010,
pp. 91
22. David Mann And Mike Sutton (2011-11-
06). ">>Netcrime" . British Journal of
Criminology. 38 (2): 201–229.
CiteSeerX 10.1.1.133.3861 .
doi:10.1093/oxfordjournals.bjc.a014232 .
Retrieved 2011-11-10.
23. "A walk on the dark side" . The Economist.
2007-09-30.
24. "DHS: Secretary Napolitano and Attorney
General Holder Announce Largest U.S.
Prosecution of International Criminal Network
Organized to Sexually Exploit Children" .
Dhs.gov. 2011-08-03. Retrieved 2011-11-10.
25. DAVID K. LI (January 17, 2012). "Zappos
cyber attack" . New York Post.
26. Salvador Rodriguez (June 6, 2012). "Like
LinkedIn, eHarmony is hacked; 1.5 million
passwords stolen" . Los Angeles Times.
27. Rick Rothacker (Oct 12, 2012). "Cyber
attacks against Wells Fargo "significant,"
handled well: CFO" . Reuters.
28. "AP Twitter Hack Falsely Claims
Explosions at White House" . Samantha
Murphy. April 23, 2013. Retrieved April 23,
2013.
29. "Fake Tweet Erasing $136 Billion Shows
Markets Need Humans" . Bloomberg. April 23,
2013. Retrieved April 23, 2013.
30. hermesauto (13 May 2017).
"Unprecedented cyber attacks wreak global
havoc" .
31. "Israeli spyware found on phones in 45
countries, U.S. Included" .
32.
https://www.sfgate.com/business/technology/a
rticle/Researchers-find-hints-of-Israeli-
spyware-around-13237819.php
33. "Your Smartphone could be running Israeli
Spyware!" . September 2018.
34. "Phone hackers for hire: A peek into the
discreet, lucrative business tapped by the
FBI" . 2016-04-29.
35. Beaumont, Peter (2016-08-26). "Israeli
firm accused of creating iPhone spyware" . The
Guardian.
36. Richet, Jean-Loup (2013). "From Young
Hackers to Crackers". International Journal of
Technology and Human Interaction. 9 (1).
37. Richet, Jean-Loup (2011). "Adoption of
deviant behavior and cybercrime 'Know how'
diffusion". York Deviancy Conference.
38. Richet, Jean-Loup (2012). "How to
Become a Black Hat Hacker? An Exploratory
Study of Barriers to Entry Into Cybercrime".
17th AIM Symposium.
39. Zehra Ali (21 January 2018). "Mandatory
Data Retention Worldwide" . Retrieved
17 December 2018.
40.
http://www.unafei.or.jp/english/pdf/RS_No79/
No79_15RC_Group2.pdf
41. Kshetri, Nir. "Diffusion and Effects of
Cyber Crime in Developing Countries" .
42. Northam, Jackie. "U.S. Creates First
Sanctions Program Against Cybercriminals" .
43. Adrian Cristian MOISE (2015). "Analysis
of Directive 2013/40/EU on attacks against
information systems in the context of
approximation of law at the European level"
(PDF). Journal of Law and Administrative
Sciences. Archived from the original (PDF) on
December 8, 2015.
44. "China's new cybersecurity law takes
effect today" . June 2017.
45. OMH. "Criminal Justice System for Adults
in NYS" . Retrieved 17 December 2018.
46. "Managing the Risks Posed by Offender
Computer Use - Perspectives" (PDF). December
2011.
47. Bowker, Art (2012). The Cybercrime
Handbook for Community Corrections:
Managing Risk in the 21st Century .
Springfield: Thomas. ISBN 9780398087289.
48. "2014 Internet Crime Report" (PDF).
Internet Crime Complaint Center (IC3). 2015.
Retrieved 2017-10-31.
49. Feinberg, T (2008). "Whether it happens
at school or off-campus, cyberbullying disrupts
and affects". Cyberbullying: 10.
50. "Dridex: Tidal waves of spam pushing
dangerous financial Trojan" (PDF).
symantec.com.
51. "Insights into Iranian Cyber Espionage:
APT33 Targets Aerospace and Energy Sectors
and has Ties to Destructive Malware « Insights
into Iranian Cyber Espionage: APT33 Targets
Aerospace and Energy Sectors and has Ties to
Destructive Malware" . FireEye. Retrieved
2018-01-03.
52. Janofsky, Adam (2018-09-19). "How AI
Can Help Stop Cyberattacks" . Wall Street
Journal. ISSN 0099-9660 . Retrieved
2018-09-20.
53. Noyes, Katherine. "This company uses A.I.
to stop cyberattacks before they start" .
Computerworld. Retrieved 2018-09-20.
54. http://asean.org/asean-declaration-
prevent-combat-cybercrime/
Further reading
Balkin, J., Grimmelmann, J., Katz, E.,
Kozlovski, N., Wagman, S. & Zarsky, T.
(2006) (eds) Cybercrime: Digital Cops in a
Networked Environment, New York
University Press, New York.
Bowker, Art (2012) "The Cybercrime
Handbook for Community Corrections:
Managing Risk in the 21st Century" Charles
C. Thomas Publishers, Ltd. Springfield.
Brenner, S. (2007) Law in an Era of Smart
Technology, Oxford: Oxford University
Press
Broadhurst, R., and Chang, Lennon Y.C.
(2013) "Cybercrime in Asia: trends and
challenges ", in B. Hebenton, SY Shou, & J.
Liu (eds), Asian Handbook of Criminology
(pp. 49–64). New York: Springer
(ISBN 978-1-4614-5217-1)
Chang, L.Y. C. (2012) Cybercrime in the
Greater China Region: Regulatory Responses
and Crime Prevention across the Taiwan
Strait . Cheltenham: Edward Elgar.
(ISBN 978-0-85793-667-7)
Chang, Lennon Y.C., & Grabosky, P.
(2014) "Cybercrime and establishing a
secure cyber world ", in M. Gill (ed)
Handbook of Security (pp. 321–339). NY:
Palgrave.
Csonka P. (2000) Internet Crime; the Draft
council of Europe convention on cyber-crime:
A response to the challenge of crime in the
age of the internet? Computer Law &
Security Report Vol.16 no.5.
Easttom C. (2010) Computer Crime
Investigation and the Law
Fafinski, S. (2009) Computer Misuse:
Response, regulation and the law
Cullompton: Willan
Glenny, Misha, DarkMarket : cyberthieves,
cybercops, and you , New York, NY : Alfred
A. Knopf, 2011. ISBN 978-0-307-59293-4
Grabosky, P. (2006) Electronic Crime, New
Jersey: Prentice Hall
Halder, D., & Jaishankar, K. (2016). Cyber
Crimes against Women in India . New Delhi:
SAGE Publishing. ISBN 978-9385985775.
Halder, D., & Jaishankar, K. (2011) Cyber
crime and the Victimization of Women: Laws,
Rights, and Regulations. Hershey, PA, USA:
IGI Global. ISBN 978-1-60960-830-9
Jaishankar, K. (Ed.) (2011). Cyber
Criminology: Exploring Internet Crimes and
Criminal behavior. Boca Raton, FL, USA:
CRC Press, Taylor and Francis Group.
McQuade, S. (2006) Understanding and
Managing Cybercrime, Boston: Allyn &
Bacon.
McQuade, S. (ed) (2009) The Encyclopedia
of Cybercrime, Westport, CT: Greenwood
Press.
Parker D (1983) Fighting Computer Crime,
U.S.: Charles Scribner's Sons.
Pattavina, A. (ed) Information Technology
and the Criminal Justice System, Thousand
Oaks, CA: Sage.
Paul Taylor (1999). Hackers: Crime in the
Digital Sublime (November 3, 1999 ed.).
Routledge; 1 edition. p. 200. ISBN 978-0-
415-18072-6.
Robertson, J. (2010, March 2). Authorities
bust 3 in infection of 13m computers.
Retrieved March 26, 2010, from Boston
News: Boston.com
Walden, I. (2007) Computer Crimes and
Digital Investigations, Oxford: Oxford
University Press.
Rolón, Darío N. Control, vigilancia y
respuesta penal en el ciberespacio , Latin
American's New Security Thinking, Clacso,
2014, pp. 167/182
Richet, J.L. (2013) From Young Hackers to
Crackers, International Journal of
Technology and Human Interaction (IJTHI),
9(3), 53-62.
Wall, D.S. (2007) Cybercrimes: The
transformation of crime in the information
age, Cambridge: Polity.
Williams, M. (2006) Virtually Criminal:
Crime, Deviance and Regulation Online,
Routledge, London.
Yar, M. (2006) Cybercrime and Society,
London: Sage.
External links
Wikimedia Commons has media related to
Cybercrime.
Government resources